[AKIRA] – Ransomware Victim: Maxus Group

image

Ransomware Group: AKIRA

VICTIM NAME: Maxus Group

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page for Maxus Group highlights significant data compromises affecting sensitive contractor information, including Non-Disclosure Agreements (NDAs), Social Security Numbers (SSNs), and contact details. The page describes the availability of various internal documents and financial records that have been exposed. Notably, the leak provides users with straightforward instructions on how to access this compromised data using torrent clients such as Vuze, uTorrent, qBittorrent, or Transmission, making it easier for individuals to download the information identified in the breach. The post was discovered and published on November 18, 2024.

The contents of the leak may include credit card screens displaying the Card Verification Value (CVV), and other financial documentation that raises concerns about the privacy and security of affected individuals. In addition, the page suggests that downloading the data can be accomplished without requiring passwords on the archives. Information about the method of access via magnet URLs is provided, indicating an organized structure for data dissemination associated with Maxus Group. This leak exemplifies the concerning practices of ransomware groups in targeting organizations and the ease with which such sensitive information can be shared across peer-to-peer networks.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.